We want to inform you about a recent cybersecurity incident involving Ingram Micro, one of our trusted providers for modern workplace and Azure services. On July 5th, Ingram Micro confirmed that elements of their internal systems were affected by a ransomware attack. They responded immediately by taking the affected systems offline, engaging leading cybersecurity experts, and notifying law enforcement authorities. Ingram Micro is working diligently to restore their services and has apologised for any disruption this may have caused.
We have been in regular contact with Ingram Micro throughout the weekend and there is no evidence that Quiss (or our customers) have been directly impacted by this incident, and we can still procure Microsoft services. Given the disruption, there may be a slight delay in procuring licenses, so please give us as much notice as possible. As you can appreciate, we are actively monitoring the situation and remain in close contact with Ingram Micro to ensure any potential risks are addressed promptly. We are having further operational conversations with their directors today and if there is anything that affects you as an end user of their services, you will be notified.
What we are doing:
- Monitoring updates from Ingram Micro and cybersecurity experts.
- Reviewing our own systems and security protocols to ensure continued protection.
- Preparing contingency plans should there be any effect on our services.
Updated information
July 8, 2025 [4:30PM PT]
Based on Investigation, Cybersecurity Incident is Contained and Remediated
As previously announced, Ingram Micro has been working diligently with leading third-party cybersecurity experts to investigate and remediate the cybersecurity incident announced on July 5, 2025, including proactively taking certain systems offline and implementing other mitigation measures. Based on these measures and the assistance of third-party cybersecurity experts, we believe the unauthorised access to our systems in connection with the incident is contained and the affected systems remediated. Our investigation into the scope of the incident and affected data is ongoing.
Our team has been working around the clock on this matter to restore affected systems. We have implemented additional safeguards and monitoring measures to protect our network environment as we bring our systems back online.